| File name: | MsMpEng.exe |
| Full analysis: | https://app.any.run/tasks/b2f2baec-263c-4857-ba82-c5c1185204e3 |
| Verdict: | Malicious activity |
| Analysis date: | December 07, 2024, 07:11:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | F13F6F649888A7B93E4670EFE7564BB3 |
| SHA1: | C0EA7812A3244147B74FEB43BD80B4CF56FF12FC |
| SHA256: | A69F26505D221F345E5AF11AEFBAECEEB62A217158C5787EA08B8C9337693D59 |
| SSDEEP: | 12288:Vf5nIZhcRrUyWoWvab27eiLLAAXmcoGZXrjGhUFw4tLRnzo4RI2Gg:Vf5nIZhcBUy9zb2aiLLAjtGZXz3BCg |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (81) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.2) |
| .exe | | | Win32 Executable (generic) (4.9) |
| .exe | | | Win16/32 Executable Delphi generic (2.2) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:03:08 21:04:37+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 692224 |
| InitializedDataSize: | 3072 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xaae2e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | myfile2.exe |
| LegalCopyright: | |
| OriginalFileName: | myfile2.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 552 | "C:\Users\admin\AppData\Local\Temp\MsMpEng.exe" | C:\Users\admin\AppData\Local\Temp\MsMpEng.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 848 | "C:\Users\admin\AppData\Local\Temp\ƓƆӸȜƱ.exe" | C:\Users\admin\AppData\Local\Temp\ƓƆӸȜƱ.exe | MsMpEng.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 1108 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1332 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES786F.tmp" "c:\Users\admin\AppData\Local\Temp\CSC786E.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 8.00.50727.5003 (Win7SP1GDR.050727-5400) Modules
| |||||||||||||||
| 1792 | C:\Users\admin\AppData\Local\Temp\svchost.exe | C:\Users\admin\AppData\Local\Temp\svchost.exe | — | MsMpEng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Version: 8.00.50727.5003 (Win7SP1GDR.050727-5400) Modules
| |||||||||||||||
| 1824 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\x_suzkgg.cmdline" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe | MsMpEng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 8.0.50727.5483 (Win7SP1GDR.050727-5400) Modules
| |||||||||||||||
| (PID) Process: | (1108) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet |
| Operation: | write | Name: | {4040CF00-1B3E-486A-B407-FA14C56B6FC0} |
Value: 525400363EFF | |||
| (PID) Process: | (848) ƓƆӸȜƱ.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Microsoft Essentials |
Value: C:\Users\admin\AppData\Local\Temp\MsMpEng.exe | |||
| (PID) Process: | (552) MsMpEng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (552) MsMpEng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (552) MsMpEng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (552) MsMpEng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1332 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RES786F.tmp | binary | |
MD5:C085B632BD65B426A53614C06C66F605 | SHA256:DF0A9CC37B205B6B40D1A5DE9FABFDC456C377981F5FEA3BB67FAB04D6D441D0 | |||
| 552 | MsMpEng.exe | C:\Users\admin\AppData\Local\Temp\x_suzkgg.0.cs | text | |
MD5:5F1F61F2DF5242E34F9045AB5065C1DC | SHA256:6487668D8D8B602532CA5AE86468B54FA39B6E4D4CC1F754CE9536B3C6FD89F8 | |||
| 552 | MsMpEng.exe | C:\Users\admin\AppData\Local\Temp\x_suzkgg.cmdline | text | |
MD5:8F4764F7C74724FF54E7980294D51C82 | SHA256:5024008DE3CD489B774BDC3885E55397E99B290BAFF2B8BF8A221F1A12E133A3 | |||
| 1824 | csc.exe | C:\Users\admin\AppData\Local\Temp\ƓƆӸȜƱ.exe | executable | |
MD5:34B010170D338FD7784EA10A5DA1C691 | SHA256:B8A371D0303143D0F5D0A43696ABB6B322F3CD8A4A868F6C7DAE92A6F0DFAFE8 | |||
| 1824 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC786E.tmp | binary | |
MD5:266E219BCE91DC9CC7241692F1277990 | SHA256:E07BAFBE665810BD6C2AADE5015911B8896E9953831EFFB444B453F6D4CF19EE | |||
| 552 | MsMpEng.exe | C:\Users\admin\AppData\Local\Temp\svchost.exe | executable | |
MD5:200FC355F85ECD4DB77FB3CAB2D01364 | SHA256:C97F276B4C70682C8F8D39B91E30F938BC6E86A42CD6B71E3AD08092DBA528E9 | |||
| 1824 | csc.exe | C:\Users\admin\AppData\Local\Temp\x_suzkgg.out | text | |
MD5:F68FF8ECD16C1B2482DB6725FE6F7EF1 | SHA256:64E4F821E9ED7450D3E20B8B22507BE498C5EF77FEBFFDC421678AA2BB0779F1 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
1108 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
ratattack.sytes.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1108 | svchost.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.sytes.net Domain |